US20040207509A1 - System and method for key control in an electronic locking system - Google Patents

System and method for key control in an electronic locking system Download PDF

Info

Publication number
US20040207509A1
US20040207509A1 US10/419,718 US41971803A US2004207509A1 US 20040207509 A1 US20040207509 A1 US 20040207509A1 US 41971803 A US41971803 A US 41971803A US 2004207509 A1 US2004207509 A1 US 2004207509A1
Authority
US
United States
Prior art keywords
key
lock
memory
password
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/419,718
Other versions
US7145434B2 (en
Inventor
Mitchell Mlynarczyk
John Payson
Aron Hoekstra
Brock Robinson
Kenneth Kaczmarz
Michael Koch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CompX International Inc
Comp X International Inc
Original Assignee
Comp X International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Comp X International Inc filed Critical Comp X International Inc
Priority to US10/419,718 priority Critical patent/US7145434B2/en
Assigned to COMPX INTERNATIONAL, INC. reassignment COMPX INTERNATIONAL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MLYNARCZYK, MITCHELL S., HOEKSTRA, ARON J., PAYSON, JOHN B., ROBINSON, BROCK E., KACZMARZ, KENNETH A., KOCH, MICHAEL J.
Publication of US20040207509A1 publication Critical patent/US20040207509A1/en
Application granted granted Critical
Publication of US7145434B2 publication Critical patent/US7145434B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00849Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed programming by learning
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/0088Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed centrally

Definitions

  • the present invention is intended as an improvement to key control systems in electronic locks.
  • the process of adding and deleting valid keys in an electronic lock system requires a supervisor, serviceman, or someone of higher position than a “normal” user to go to the lock to perform the manipulation. Once this person is at the lock they can either (1) show a “supervisor” key which will allow other keys to be added or deleted, (2) show a “programming” key which will allow other keys to be added or deleted, or (3) connect to the lock through a computer which will update the lock's memory.
  • each of these methods requires someone in a management position to visit each lock that needs to be updated. If, as in the vending machine industry, there are hundreds of machines (locks) that need to be maintained, this process can be quite expensive and time consuming.
  • each lock keeps track of the keys that were presented to it, valid and invalid. A manager may then go to the lock and upload (into a computer) the keys that were presented to the lock. This is commonly called an “audit trail”. If a supervisor needed to know which locks a key has been taken to, the supervisor would need to visit each lock that the key could be taken to, and upload each machine's audit trail. As noted above, the cost associated with a manager visiting each machine is quite high.
  • the present invention includes a key control and audit trail system that uses standard “user” keys as a method of maintaining lock databases and gathering audit trails. The process is completely invisible to the standard user may and take place during normal, standard user, key use. A method is provided to simply and conveniently perform and track these operations.
  • the present invention includes preparing a dataset of key to lock relationships that designate which keys are accessible to which locks.
  • the accessibility of the keys to the locks allows for the locks to be opened by an appropriate key.
  • This dataset of key to lock relationships is transferred to a memory of one of the keys, and the key is presented to one of the locks. At least a portion of the dataset is transferred from the key to a memory of the lock. Consequently, the memory of the lock is updated according to any changes that may be present in the dataset.
  • the memory of the key is also updated in order to reflect any updated change to the lock.
  • the key may then be placed in communication with a computer and at least a portion of the memory of the key may be transferred to a database in the computer.
  • This transfer updates the database and allows for an indication of the completion of the update to the memory of the lock. Therefore, the administrator of the system is informed that the change in the key to lock relationships has been effectively communicated to that particular lock.
  • the dataset of key to lock relationships and the changes made thereto may be done on the same computer as the database, or may be conducted on a separate computer or other device.
  • the lock may be an electronic lock that has a serial number.
  • the dataset may assign a unique alphanumeric lock name to the serial number of the lock.
  • the key may be an electronic key that has a serial number with a unique alphanumeric user name assigned to the serial number in the dataset of key to lock relationships.
  • a modification log may be created when the administrator desires a change to be made to the dataset of key to lock relationship.
  • This modification log can be transferred to the lock memory through the key memory and eventually back to the computer.
  • the lock memory may update the modification log with the date and time of completion of the update to the memory of the lock.
  • the database may be updated with the locks that have been modified along with the date and time of modification. Encryption and other forms of protection may be incorporated in order to ensure the integrity of the system.
  • the key may have an encrypted key ID
  • the lock may have a list of valid key IDs in the memory of the lock.
  • the lock Upon presenting the key to the lock, the lock will decrypt the key ID, and then compare the key ID to the list of valid key IDs of the memory of the lock. If the IDs do not match, the key will not have access to the lock and the lock remains closed. If the IDs do match, a second layer of protection will be used in order to ensure that the key being presented is valid.
  • a key is provided with an encrypted key password in the memory of the key
  • the lock is provided with a lock password that corresponds to the key in the memory of the lock.
  • the lock will search the key memory for the encrypted key password that corresponds to the particular lock into which the key is presented.
  • the lock will decrypt the key password and compare the key password to the lock password corresponding to that particular key.
  • a new lock password is selected by the lock, encrypted, and stored in the memory of the key. If the passwords match, the lock will open and allow access to the user. If the passwords do not match, the key is not deemed to be valid and the lock will remain closed.
  • FIG. 1 is a screen showing the creation of a new user.
  • FIG. 2 is a screen showing the creation of a new lock.
  • FIG. 3 is a screen showing the access rights screen with the user not having access.
  • FIG. 4 is a screen showing the empty modification queue.
  • FIG. 5 is a screen that shows the user having access and the modification in an incomplete state.
  • FIG. 6 is a screen that shows the modification queue with one modification that has not been sent.
  • FIG. 7 is a screen showing the key maintenance operation.
  • FIG. 8 is a screen showing the key maintenance log for an outgoing modification.
  • FIG. 9 is a screen that shows the modification queue with a modification that has been sent.
  • FIG. 10 is a flow chart showing the key validation process.
  • FIG. 11 is a screen showing the key audit trail.
  • FIG. 12 is a screen showing the key maintenance log for a completed modification.
  • FIG. 13 is a screen that indicates the modification is in a complete state.
  • FIG. 14 is a perspective view of an electronic lock system in accordance with an exemplary embodiment of the present invention.
  • reference numeral 1 designates the lock/user editor in a software package. This menu is used by the administrator or supervisor to create and maintain users, locks, and access rights in the system.
  • the first tab, the user editor 2 is used to create and maintain users. Maintaining users can be one of four options in the options area 3 .
  • the trademark i Button® is a federally registered trademark owned by Dallas Semiconductor Corporation, and used for the sale of goods and services including metal containers for enclosing semiconductor and integrated circuit devices, microprocessors and/or microcomputers, in addition to the sale of goods and services including semiconductor and integrated circuit units.
  • the trademark i Button's ® is covered under registration numbers: 2,478,289; 2,482,685; 2,388,024; and 2,388,023.
  • the Add User step creates a one-to-one relationship between the i Button's ® serial number and the user name. Each time the software uses the user's name it actually is referring to the i Button's ® serial number. Once the user's information is entered into the system their name will be displayed in the user name list box 7 . In this exemplary embodiment, “key 8 ” has been entered and is displayed by reference numeral 8 . In theory, the administrator would repeat this process until every user that will have access to any of the locks is entered into the system. The maximum number of users is limited only by the memory size in the administrator's computer.
  • reference numeral 10 designates the lock editor tab. This tab is used to create and maintain locks. Maintaining locks can be one of four options in an options area 11 .
  • the administrator presses the Add Lock button 12 . This allows the new lock's name to be entered into the Lock Name field 13 , the lock's serial number into the Lock Serial# field 14 , and the lock's pass code into the Pass Code# field 15 .
  • the lock's pass code is a number that the software uses in order to communicate with the lock. This is an additional level of security that prevents unauthorized software use. This step creates a one-to-one relationship between the lock's serial number and the lock name.
  • lock name list box 16 Each time the software uses the lock's name it actually is referring to the lock's serial number. Once the lock's information is entered into the system it's name will be displayed in the lock name list box 16 . In this exemplary embodiment, “lock 1 ” has been entered and is displayed by reference numeral 17 . In theory, the administrator would repeat this process until every lock that will be accessed by the users is entered into the system. The maximum number of locks is limited only by the memory size in the administrator's computer.
  • FIG. 3 illustrates the access rights screen. Using this screen the operator chooses which users can use (open) which locks.
  • the access rights tab 18 is the third tab available on the lock user editor menu 1 . It is a three section window that shows which users have or do not have access to certain locks. Alternatively, the access right tab may display which locks can or cannot be accessed by certain users.
  • the far left area is the user name list box 20 . This box will show all users that have been entered into the system, using the method illustrated in FIG. 1.
  • Key 8 which is shown by reference numeral 21 is selected.
  • the second and third areas illustrate which locks the selected user has access to 23 and which locks the user does not have access to 22 . All of the locks, created by the method illustrated in FIG. 2, will appear in one of the two areas shown by reference numerals 22 and 23 .
  • “Key 8 ”, reference number 21 does not have access to “lock 1 ,” at reference numeral 24 .
  • Each of these entries, in the two areas 22 and 23 are accompanied by a checked or unchecked box.
  • a checked box denotes that this user-lock relationship is complete, signifying that the relationship is true in the lock's memory.
  • An unchecked box denotes that this user-lock relationship is incomplete, signifying that it is true in the administrator's computer only, not the lock.
  • the checked box at reference numeral 25 denotes that “lock 1 ”, reference numeral 24 , has a completed user lock relationship stored in the memory of “lock 1 ”, reference numeral 24 .
  • modification queue Every time that a user-lock relationship is modified by the administrator, a record of the incomplete modifications is kept. This record is called the modification queue. It is accessed by the modification queue button 26 as shown in FIG. 4.
  • the modification queue 28 in this exemplary embodiment is empty. All entries in the queue are stored in the modification queue list 27 .
  • “key 8 ” 21 has been given access to “lock 1 ” 31 .
  • the administrator selected “key 8 ” 21 and “lock 1 ” 31 , then used one of the access modification buttons 29 to give “key 8 ” 21 access to “lock 1 ” 31 .
  • the button illustrated by reference numeral 30 moves one entry from the “does not have access” section 22 to the “does have access” section 23 .
  • Other access modification buttons 29 exist to do the opposite modification and to perform multiple modifications in both directions.
  • “lock 1 ” 31 is shown in the “locks selected user has access to” area 23 and is shown with an unchecked box 32 . Pressing the modification queue button 26 will again bring up the modification queue, now illustrated in FIG. 6.
  • the modification queue is a multi column report that includes: an action type 33 , a user name 34 , a lock name 35 , a “sent” status 36 , and a priority level 37 .
  • the action type 33 typically shows whether the user is being added or deleted. Here, the action type 33 is “add user” 38 .
  • the user name 34 shows to which user name the action type 33 is being performed, in this case, “key 8 ” 39 .
  • the lock name 35 shows to which lock name the action type 33 is being performed, in this case “lock 1 ” 40 .
  • the “sent” status 36 shows whether or not the modification has been sent, on a user key to the lock. In this case the “sent status” is “No” 41 .
  • each key may be limited to two hundred lock-key manipulations in certain exemplary embodiments, and there may be more than two hundred modifications in the queue, there is a system to raise the priority of select manipulations. This status is shown in the priority column 37 and in this case is “low” 42 .
  • FIG. 7 a special i Button® menu 45 is shown.
  • the first tab is the key maintenance tab 46 .
  • This tab 46 has a key maintenance “prepare for receive” button 47 which is used to begin the key maintenance process.
  • This process (1) removes key audit trails from the key, (2) removes processed lock-key manipulations from the key, and (3) adds any new lock-key manipulations to the key.
  • incomplete modifications such as the one shown in FIG. 6 are transferred to locks and information is brought back to the software.
  • Information input to the software informs the software that the modification is complete so that this modification may be removed from the modification queue and can be recorded as complete.
  • the key audit trail window 50 is shown. This is illustrated in FIG. 8. Any audit trails present on the key would be displayed in the audit trail display area 51 .
  • the key log button 52 is pressed. This will cause the key maintenance log to be displayed.
  • the key was scanned 53 , there was an “add user” command placed on the key 54 , which added add “key 8 ” 56 to “lock 1 ” 55 . Additionally, any other modifications to the key would likewise be displayed.
  • An additional operation available in the modification queue is the ability to set a higher priority on some desired modifications. This may be needed due to possible limited number of lock-key manipulations that each key can store.
  • the key is limited to two hundred manipulations.
  • the software takes the oldest two hundred modifications and loads them on the key. It is feasible that the administrator may perform a manipulation that needs to be performed immediately, and there are more than two hundred manipulations in the modification log.
  • the priority high button 61 By pressing the priority high button 61 , the manipulation has a higher priority and is taken first during a key maintenance. The key maintenance procedure will take the “high priority” manipulations first, then it will take the oldest “low priority” manipulations until two hundred are placed on the key. If a manipulation was inadvertently given “high priority,” the “priority low” button 60 can be used to correct.
  • the key When the key is taken to a lock, a number of operations are performed. This process is illustrated in FIG. 10.
  • “key 8 ” is taken by an operator to “lock 1 ”.
  • the first step is the presentation of the key to the lock 66 .
  • the key may be Dallas Semiconductor 64 k i Button® manufactured by Dallas Semiconductor having offices at 4401 South Beltwood Parkway, Dallas, Tex., 75244.
  • the i Button® is a memory chip mounted in a two-piece metal can. Simply touching the metal can to an i Button® receptor allows a microprocessor based system to read from and write to the chip's (key's) memory.
  • One such system employs an i Button® with 64 k of memory.
  • the internal memory structure of the key is divided into five hundred pages. These pages are divided as follows: one hundred lock passwords, two hundred lock-key database manipulation pages, and two hundred key audit trail pages.
  • the presentation is performed by simply placing the key against an i Button ® receptor, such that the key and the receptor are in electrical contact.
  • the communication is automatic (as seen by the user) and is detailed in technical manuals published by Dallas Semiconductor.
  • the entire process disclosed in FIG. 10 may be performed by the lock's microprocessor communicating with the memory inside the key. It requires no intervention or action by the operator, with the exception of the operator placing the key on the receptor.
  • other key systems may be used in practice of the present invention besides the Dallas Semiconductor i Button®.
  • the first lock to key communication occurs when the lock places the lock's serial number and the date and time in the key's audit trail memory section 67 .
  • the key can remember a maximum of two hundred audit trails. When the audit trail section is full, the oldest entry gets replaced by the newest.
  • the lock reads the lock-key manipulation section of the key 68 .
  • the lock searches for any modifications that relate to this particular lock.
  • the key is limited to two hundred manipulations, so theoretically there could be one manipulation that corresponds to the lock that is scanning the key and one hundred ninety nine that correspond to other locks.
  • the manipulations could include the “add user” command and the “delete user” command.
  • the manipulations are then processed 69 .
  • the lock If the lock reads an “add user” command, it will add that user (key) as a valid user (along with its key ID and password) to the lock's memory. If the lock reads a “delete user” command, the lock will delete that user (along with its key ID and password) from the lock's memory. If the lock gets a “delete user” command for a user that is not in the lock's memory, the lock will remember that user number and block any “add user” commands for that user that the lock may get in the future. After the manipulations are processed, the lock changes the modifications on the key to show that they are complete 70 . For example, an “add user” command is replaced with an “added user” command.
  • the lock determines if the key is valid, and if this is the case, the lock will open.
  • the first step in this process is reading of the key ID 71 by the lock.
  • the key ID is encrypted and therefore must be decrypted.
  • the lock compares the key ID to the list of valid key IDs in the lock's memory and determines its validity 72 . If the key ID is not valid 74 , the process is completed and the lock does not open 75 . If the key ID is valid 73 , the lock searches the lock's memory for the password that corresponds to that key 76 .
  • the lock searches the key's memory for the password that corresponds to that specific lock 77 . Since the password is encrypted, the lock must decrypt it. The lock then compares the two passwords and determines if they match 78 . If they do not match, then the key is not valid 79 , the process is completed and the lock does not open 75 . If the passwords match 80 , the key is determined to be valid. The lock then picks a new password to be used for the next access. This new password is then stored in the key (encrypted) and in the lock 81 . The lock then opens 82 . The process of changing passwords makes electronically “picking” or “hacking” the lock significantly more difficult since not only must the key ID be known, but a constantly changing password must be known to gain unauthorized access. The encryption process adds another level of complexity to the hacking process.
  • the audit trail window 50 shows information received from “key 8 ”.
  • the audit trail report is multi-column. It consists of a lock name 84 , a result 85 , a date 86 , and a time 87 .
  • the lock name column 84 shows that the key was brought to “lock 1 ” 88 .
  • the result column 85 shows that the key was scanned and opened 89 .
  • this column It is possible for this column to also show that the key processing was interrupted or that it was just scanned and not opened.
  • the date 86 and time 87 show the date 90 and time 91 that the key was brought to the lock, in this case 1:44 pm on Nov. 18, 2002. Pressing the key log 52 button will bring up the details of the key maintenance, as shown in FIG. 12.
  • the key was scanned 94 , there was a completed “add user” command on the key 95 , this command led to “key 8 ” 97 being added to “lock 1 ” 96 . If there were multiple completed modifications on the key, each of these modifications would be shown in kind.
  • the audit trail section of the key was read on the key 98 and one audit trail was found 99 . This audit trail was displayed and shown in reference numerals 88 - 91 as labeled in FIG. 11 . If there were any new/incomplete modifications, as shown in the modification queue of FIG. 6, they would be added to the key at this time.
  • FIG. 14 shows an electronic lock system that may in one exemplary embodiment incorporate the user addition, deletion and verification feature as described herein.
  • the electronic lock system is provided with a lock 110 that may be as described in commonly owned U.S. patent application Ser. No. 10/318,328 entitled “Electromechanical Locking Mechanism” filed on Dec. 12, 2002, assigned to Compx Inc. and whose inventors are Richard A. Martinez, Brian Lee Hahn, Mitch Mlynarczyk, Michael Kock, Robert Brewczynski, Stephan Juliana Bevilacqua, Kenneth A. Kaczmarz, Brock Robinson, and John Payson.
  • Such U.S. patent application Ser. No. 10/318,328 is incorporated by reference in its entirety herein for all purposes.
  • the lock 110 is provided with a motor 116 that may be actuated through a microprocessor based control circuit in the lock 110 .
  • the motor 116 turns a latching hook 120 in order to either engage or disengage a U-bolt 118 .
  • the U-bolt 118 may be connected to a door or other structure desired to be closed and/or locked by the lock 110 .
  • the lock 110 is also. provided with a lock memory 112 .
  • the lock memory 112 may either include the microprocessor control circuit in the lock 110 or be in communication with the microprocessor control circuit.
  • the lock memory 112 is provided with a memory interface 114 in order to communicate with a key 122 .
  • the key 122 incorporates therein a key memory 124 and a key interface 126 .
  • the key interface 126 may be placed in contact with the memory interface 114 of lock 110 in order to transfer data to and from the lock memory 112 and key memory 124 .
  • the electronic lock system also includes a computer 128 into which a database 130 may be retained.
  • the database 130 may be used in order to create a dataset of key to lock relationships, and a modification log that may be used to alter the key to lock relationship.
  • the computer 128 has a computer to key interface 132 that is used for transmitting data to and from the key memory 124 through the key interface 126 .

Abstract

An apparatus and a method for use with an electronic locking system is provided. At least one key is selected in order to have access to at least one lock. This key to lock relationship is transferred to a memory of the key. The key is presented to the lock and at least a portion of the key to lock relationship from the key is transferred to a memory of the lock. This transfer updates the memory of the key to lock relationships in the lock. The update of the memory in the lock is noted in the memory of the key. The key may then be placed in communication with a computer so that at least a portion of the memory of the key is transferred to a database in the computer. This transfer updates the database in order to reflect the fact that the memory of the lock has been updated and completed.

Description

    BACKGROUND
  • The present invention is intended as an improvement to key control systems in electronic locks. Currently, the process of adding and deleting valid keys in an electronic lock system requires a supervisor, serviceman, or someone of higher position than a “normal” user to go to the lock to perform the manipulation. Once this person is at the lock they can either (1) show a “supervisor” key which will allow other keys to be added or deleted, (2) show a “programming” key which will allow other keys to be added or deleted, or (3) connect to the lock through a computer which will update the lock's memory. As previously stated, each of these methods requires someone in a management position to visit each lock that needs to be updated. If, as in the vending machine industry, there are hundreds of machines (locks) that need to be maintained, this process can be quite expensive and time consuming. [0001]
  • Further, in currently available electronic lock systems, each lock keeps track of the keys that were presented to it, valid and invalid. A manager may then go to the lock and upload (into a computer) the keys that were presented to the lock. This is commonly called an “audit trail”. If a supervisor needed to know which locks a key has been taken to, the supervisor would need to visit each lock that the key could be taken to, and upload each machine's audit trail. As noted above, the cost associated with a manager visiting each machine is quite high. [0002]
  • There are other currently available systems that will allow remote database manipulation and audit trail gathering. These systems require either expensive integral call phone technology, or an expensive hard wired network system. [0003]
  • A need for a system exists that will allow user database manipulation and audit trail gathering automatically, cost effectively, and without requiring managers to visit locks periodically. [0004]
  • Some examples of current electronic lock systems include U.S. Pat. Nos.: 4,916,443; 5,475,375; 4,988,987; 4,947,163; 4,887,292; and 4,766,746. The entire disclosure of these six United States patents are incorporated by reference herein in their entirety for all purposes. [0005]
  • SUMMARY
  • Various features and advantages of the invention will be set forth in part in the following description, or may be understood from the description, or may be learned from practice of the invention. The present invention includes a key control and audit trail system that uses standard “user” keys as a method of maintaining lock databases and gathering audit trails. The process is completely invisible to the standard user may and take place during normal, standard user, key use. A method is provided to simply and conveniently perform and track these operations. [0006]
  • The present invention includes preparing a dataset of key to lock relationships that designate which keys are accessible to which locks. In one exemplary embodiment of the present invention the accessibility of the keys to the locks allows for the locks to be opened by an appropriate key. This dataset of key to lock relationships is transferred to a memory of one of the keys, and the key is presented to one of the locks. At least a portion of the dataset is transferred from the key to a memory of the lock. Consequently, the memory of the lock is updated according to any changes that may be present in the dataset. The memory of the key is also updated in order to reflect any updated change to the lock. [0007]
  • In an alternative exemplary embodiment, the key may then be placed in communication with a computer and at least a portion of the memory of the key may be transferred to a database in the computer. This transfer updates the database and allows for an indication of the completion of the update to the memory of the lock. Therefore, the administrator of the system is informed that the change in the key to lock relationships has been effectively communicated to that particular lock. [0008]
  • The dataset of key to lock relationships and the changes made thereto may be done on the same computer as the database, or may be conducted on a separate computer or other device. [0009]
  • The lock may be an electronic lock that has a serial number. The dataset may assign a unique alphanumeric lock name to the serial number of the lock. Additionally, the key may be an electronic key that has a serial number with a unique alphanumeric user name assigned to the serial number in the dataset of key to lock relationships. [0010]
  • In one exemplary embodiment of the present invention a modification log may be created when the administrator desires a change to be made to the dataset of key to lock relationship. This modification log can be transferred to the lock memory through the key memory and eventually back to the computer. During transfer, the lock memory may update the modification log with the date and time of completion of the update to the memory of the lock. Once transferred to the computer, the database may be updated with the locks that have been modified along with the date and time of modification. Encryption and other forms of protection may be incorporated in order to ensure the integrity of the system. For instance, the key may have an encrypted key ID, and the lock may have a list of valid key IDs in the memory of the lock. Upon presenting the key to the lock, the lock will decrypt the key ID, and then compare the key ID to the list of valid key IDs of the memory of the lock. If the IDs do not match, the key will not have access to the lock and the lock remains closed. If the IDs do match, a second layer of protection will be used in order to ensure that the key being presented is valid. [0011]
  • Here, a key is provided with an encrypted key password in the memory of the key, and the lock is provided with a lock password that corresponds to the key in the memory of the lock. The lock will search the key memory for the encrypted key password that corresponds to the particular lock into which the key is presented. The lock will decrypt the key password and compare the key password to the lock password corresponding to that particular key. A new lock password is selected by the lock, encrypted, and stored in the memory of the key. If the passwords match, the lock will open and allow access to the user. If the passwords do not match, the key is not deemed to be valid and the lock will remain closed. [0012]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a screen showing the creation of a new user. [0013]
  • FIG. 2 is a screen showing the creation of a new lock. [0014]
  • FIG. 3 is a screen showing the access rights screen with the user not having access. [0015]
  • FIG. 4 is a screen showing the empty modification queue. [0016]
  • FIG. 5 is a screen that shows the user having access and the modification in an incomplete state. [0017]
  • FIG. 6 is a screen that shows the modification queue with one modification that has not been sent. [0018]
  • FIG. 7 is a screen showing the key maintenance operation. [0019]
  • FIG. 8 is a screen showing the key maintenance log for an outgoing modification. [0020]
  • FIG. 9 is a screen that shows the modification queue with a modification that has been sent. [0021]
  • FIG. 10 is a flow chart showing the key validation process. [0022]
  • FIG. 11 is a screen showing the key audit trail. [0023]
  • FIG. 12 is a screen showing the key maintenance log for a completed modification. [0024]
  • FIG. 13 is a screen that indicates the modification is in a complete state. [0025]
  • FIG. 14 is a perspective view of an electronic lock system in accordance with an exemplary embodiment of the present invention.[0026]
  • DETAILED DESCRIPTION
  • Reference will now be made in detail to embodiments of the invention, one or more examples of which are illustrated in the drawings. Each example is provided by way of explanation of the invention, and not meant as a limitation of the invention. For example, features illustrated or described as part of one embodiment can be used with another embodiment to yield still a third embodiment. It is intended that the present invention include these and other modifications and variations. [0027]
  • Computer hardware and software may be employed in order to provide a method of maintaining lock databases and gathering audit trails through the use of standard “user” keys. Referring to FIG. 1, [0028] reference numeral 1 designates the lock/user editor in a software package. This menu is used by the administrator or supervisor to create and maintain users, locks, and access rights in the system. The first tab, the user editor 2, is used to create and maintain users. Maintaining users can be one of four options in the options area 3. To create a user, the administrator presses the Add User button 4. This allows the new user's name to be entered into the User Name field 5 and the user's key (iButton ®) serial number into the iButton® Serial Number field 6. The trademark iButton® is a federally registered trademark owned by Dallas Semiconductor Corporation, and used for the sale of goods and services including metal containers for enclosing semiconductor and integrated circuit devices, microprocessors and/or microcomputers, in addition to the sale of goods and services including semiconductor and integrated circuit units. The trademark iButton's ® is covered under registration numbers: 2,478,289; 2,482,685; 2,388,024; and 2,388,023.
  • The Add User step creates a one-to-one relationship between the [0029] iButton's ® serial number and the user name. Each time the software uses the user's name it actually is referring to the iButton's ® serial number. Once the user's information is entered into the system their name will be displayed in the user name list box 7. In this exemplary embodiment, “key 8” has been entered and is displayed by reference numeral 8. In theory, the administrator would repeat this process until every user that will have access to any of the locks is entered into the system. The maximum number of users is limited only by the memory size in the administrator's computer.
  • Turning now to FIG. 2, [0030] reference numeral 10 designates the lock editor tab. This tab is used to create and maintain locks. Maintaining locks can be one of four options in an options area 11. To create a lock, the administrator presses the Add Lock button 12. This allows the new lock's name to be entered into the Lock Name field 13, the lock's serial number into the Lock Serial# field 14, and the lock's pass code into the Pass Code# field 15. The lock's pass code is a number that the software uses in order to communicate with the lock. This is an additional level of security that prevents unauthorized software use. This step creates a one-to-one relationship between the lock's serial number and the lock name. Each time the software uses the lock's name it actually is referring to the lock's serial number. Once the lock's information is entered into the system it's name will be displayed in the lock name list box 16. In this exemplary embodiment, “lock 1” has been entered and is displayed by reference numeral 17. In theory, the administrator would repeat this process until every lock that will be accessed by the users is entered into the system. The maximum number of locks is limited only by the memory size in the administrator's computer.
  • FIG. 3 illustrates the access rights screen. Using this screen the operator chooses which users can use (open) which locks. The [0031] access rights tab 18 is the third tab available on the lock user editor menu 1. It is a three section window that shows which users have or do not have access to certain locks. Alternatively, the access right tab may display which locks can or cannot be accessed by certain users. There is a selection button 19 that allows the operator to choose which listing, whether by users or locks, will be displayed. In this exemplary embodiment, the screen is shown to display which locks can or cannot be accessed by certain users. The far left area is the user name list box 20. This box will show all users that have been entered into the system, using the method illustrated in FIG. 1. “Key 8” which is shown by reference numeral 21 is selected. The second and third areas illustrate which locks the selected user has access to 23 and which locks the user does not have access to 22. All of the locks, created by the method illustrated in FIG. 2, will appear in one of the two areas shown by reference numerals 22 and 23.
  • [0032] Key 8”, reference number 21, does not have access to “lock 1,” at reference numeral 24. Each of these entries, in the two areas 22 and 23 are accompanied by a checked or unchecked box. A checked box denotes that this user-lock relationship is complete, signifying that the relationship is true in the lock's memory. An unchecked box denotes that this user-lock relationship is incomplete, signifying that it is true in the administrator's computer only, not the lock. The checked box at reference numeral 25, denotes that “lock 1”, reference numeral 24, has a completed user lock relationship stored in the memory of “lock 1”, reference numeral 24.
  • Every time that a user-lock relationship is modified by the administrator, a record of the incomplete modifications is kept. This record is called the modification queue. It is accessed by the [0033] modification queue button 26 as shown in FIG. 4. The modification queue 28 in this exemplary embodiment is empty. All entries in the queue are stored in the modification queue list 27.
  • Turning to FIG. 5, “key [0034] 821 has been given access to “lock 131. The administrator selected “key 821 and “lock 131, then used one of the access modification buttons 29 to give “key 821 access to “lock 131. The button illustrated by reference numeral 30 moves one entry from the “does not have access” section 22 to the “does have access” section 23. Other access modification buttons 29 exist to do the opposite modification and to perform multiple modifications in both directions. In this exemplary embodiment “lock 131 is shown in the “locks selected user has access to” area 23 and is shown with an unchecked box 32. Pressing the modification queue button 26 will again bring up the modification queue, now illustrated in FIG. 6.
  • The modification queue is a multi column report that includes: an [0035] action type 33, a user name 34, a lock name 35, a “sent” status 36, and a priority level 37. The action type 33 typically shows whether the user is being added or deleted. Here, the action type 33 is “add user” 38. The user name 34 shows to which user name the action type 33 is being performed, in this case, “key 839. The lock name 35 shows to which lock name the action type 33 is being performed, in this case “lock 140. The “sent” status 36 shows whether or not the modification has been sent, on a user key to the lock. In this case the “sent status” is “No” 41. Since each key may be limited to two hundred lock-key manipulations in certain exemplary embodiments, and there may be more than two hundred modifications in the queue, there is a system to raise the priority of select manipulations. This status is shown in the priority column 37 and in this case is “low” 42.
  • Turning now to FIG. 7, a special [0036] i Button® menu 45 is shown. The first tab is the key maintenance tab 46. This tab 46 has a key maintenance “prepare for receive” button 47 which is used to begin the key maintenance process. This process (1) removes key audit trails from the key, (2) removes processed lock-key manipulations from the key, and (3) adds any new lock-key manipulations to the key. Using this process, incomplete modifications such as the one shown in FIG. 6 are transferred to locks and information is brought back to the software. Information input to the software informs the software that the modification is complete so that this modification may be removed from the modification queue and can be recorded as complete.
  • The administrator presses the “prepare for receive” [0037] button 47 and places the user key in a base station attached to the computer. This will begin the maintenance process noted above. In one exemplary embodiment as discussed above the manipulation of adding “key 8” to “lock 1” will be placed on the key. A record of all key maintenances performed is kept and can be viewed by pressing the history log button 48.
  • After the maintenance is performed, the key [0038] audit trail window 50 is shown. This is illustrated in FIG. 8. Any audit trails present on the key would be displayed in the audit trail display area 51. To see details of the key maintenance, the key log button 52 is pressed. This will cause the key maintenance log to be displayed. Here, it can be seen that the key was scanned 53, there was an “add user” command placed on the key 54, which added add “key 856 to “lock 155. Additionally, any other modifications to the key would likewise be displayed.
  • Turning now to FIG. 9, changes to the modification queue after a key maintenance has been performed are displayed. FIG. 9 is identical to FIGS. 5-6 with the exception of the sent [0039] column 36. It now shows that the modification has been sent. This is shown by “Yes-159. Each time a key maintenance is performed, the second half of this entry gets incremented (yes-2, yes-3 etc). This continues until a key maintenance is performed and a key comes back whose lock-key manipulations section shows that the modification has been completed.
  • Various bookkeeping functions are available in the modification queue. These include filter/[0040] sort 62, action type 63, and criteria 64. The filtering option allows the administrator to remove all entries except those containing a specific character string. The sort command will place the queue in alphabetical order. The administrator chooses the desired filtering or sorting in the action type 63 pull down menu. Specifically the administrator chooses in which column the operation will be performed. Finally, the administrator chooses the criteria, or the specific character string in which to operate. An example would be “filter by” 62, user name in the action type 63 box, and “key 8” in the criteria 64 box. If the administrator performed this filter, the screen would only show modifications involving “key 8”.
  • An additional operation available in the modification queue is the ability to set a higher priority on some desired modifications. This may be needed due to possible limited number of lock-key manipulations that each key can store. In one exemplary embodiment, the key is limited to two hundred manipulations. When a key maintenance is performed, the software takes the oldest two hundred modifications and loads them on the key. It is feasible that the administrator may perform a manipulation that needs to be performed immediately, and there are more than two hundred manipulations in the modification log. By pressing the priority [0041] high button 61, the manipulation has a higher priority and is taken first during a key maintenance. The key maintenance procedure will take the “high priority” manipulations first, then it will take the oldest “low priority” manipulations until two hundred are placed on the key. If a manipulation was inadvertently given “high priority,” the “priority low” button 60 can be used to correct.
  • When the key is taken to a lock, a number of operations are performed. This process is illustrated in FIG. 10. For this exemplary embodiment, “key [0042] 8” is taken by an operator to “lock 1”. The first step is the presentation of the key to the lock 66. The key may be Dallas Semiconductor 64 k iButton® manufactured by Dallas Semiconductor having offices at 4401 South Beltwood Parkway, Dallas, Tex., 75244. The iButton® is a memory chip mounted in a two-piece metal can. Simply touching the metal can to an iButton® receptor allows a microprocessor based system to read from and write to the chip's (key's) memory. One such system employs an iButton® with 64 k of memory. The internal memory structure of the key is divided into five hundred pages. These pages are divided as follows: one hundred lock passwords, two hundred lock-key database manipulation pages, and two hundred key audit trail pages.
  • The presentation is performed by simply placing the key against an [0043] iButton ® receptor, such that the key and the receptor are in electrical contact. The communication is automatic (as seen by the user) and is detailed in technical manuals published by Dallas Semiconductor. The entire process disclosed in FIG. 10 may be performed by the lock's microprocessor communicating with the memory inside the key. It requires no intervention or action by the operator, with the exception of the operator placing the key on the receptor. Of course, other key systems may be used in practice of the present invention besides the Dallas Semiconductor iButton®.
  • The first lock to key communication occurs when the lock places the lock's serial number and the date and time in the key's audit [0044] trail memory section 67. In this exemplary embodiment, the key can remember a maximum of two hundred audit trails. When the audit trail section is full, the oldest entry gets replaced by the newest. Secondly, the lock reads the lock-key manipulation section of the key 68. The lock then searches for any modifications that relate to this particular lock. In this exemplary embodiment, the key is limited to two hundred manipulations, so theoretically there could be one manipulation that corresponds to the lock that is scanning the key and one hundred ninety nine that correspond to other locks. The manipulations could include the “add user” command and the “delete user” command. The manipulations are then processed 69. If the lock reads an “add user” command, it will add that user (key) as a valid user (along with its key ID and password) to the lock's memory. If the lock reads a “delete user” command, the lock will delete that user (along with its key ID and password) from the lock's memory. If the lock gets a “delete user” command for a user that is not in the lock's memory, the lock will remember that user number and block any “add user” commands for that user that the lock may get in the future. After the manipulations are processed, the lock changes the modifications on the key to show that they are complete 70. For example, an “add user” command is replaced with an “added user” command.
  • After the audit trail section of the key has been written to [0045] 67 and the lock-key manipulations have been performed 68, 69, and 70 the lock then determines if the key is valid, and if this is the case, the lock will open. The first step in this process is reading of the key ID 71 by the lock. The key ID is encrypted and therefore must be decrypted. The lock compares the key ID to the list of valid key IDs in the lock's memory and determines its validity 72. If the key ID is not valid 74, the process is completed and the lock does not open 75. If the key ID is valid 73, the lock searches the lock's memory for the password that corresponds to that key 76. The lock then searches the key's memory for the password that corresponds to that specific lock 77. Since the password is encrypted, the lock must decrypt it. The lock then compares the two passwords and determines if they match 78. If they do not match, then the key is not valid 79, the process is completed and the lock does not open 75. If the passwords match 80, the key is determined to be valid. The lock then picks a new password to be used for the next access. This new password is then stored in the key (encrypted) and in the lock 81. The lock then opens 82. The process of changing passwords makes electronically “picking” or “hacking” the lock significantly more difficult since not only must the key ID be known, but a constantly changing password must be known to gain unauthorized access. The encryption process adds another level of complexity to the hacking process.
  • The lock may be any motor or solenoid based mechanical system that has a microprocessor based control circuit, provided with memory. Typically, the motor or solenoid controls a linkage that locks a door. However, the lock may be used in conjunction with structures other than doors in different exemplary embodiments of the present invention. [0046]
  • After the key as been brought to the lock(s), it is returned to the administrator to remove, process, and record the audit trail(s) and the completed modification(s). The administrator performs the key maintenance procedure, again, as described in FIG. 7. Turning now to FIG. 11, the [0047] audit trail window 50 shows information received from “key 8”. The audit trail report is multi-column. It consists of a lock name 84, a result 85, a date 86, and a time 87. In this exemplary embodiment, the lock name column 84 shows that the key was brought to “lock 188. The result column 85 shows that the key was scanned and opened 89. It is possible for this column to also show that the key processing was interrupted or that it was just scanned and not opened. The date 86 and time 87 show the date 90 and time 91 that the key was brought to the lock, in this case 1:44 pm on Nov. 18, 2002. Pressing the key log 52 button will bring up the details of the key maintenance, as shown in FIG. 12. Here, the key was scanned 94, there was a completed “add user” command on the key 95, this command led to “key 897 being added to “lock 196. If there were multiple completed modifications on the key, each of these modifications would be shown in kind. Finally, the audit trail section of the key was read on the key 98 and one audit trail was found 99. This audit trail was displayed and shown in reference numerals 88-91 as labeled in FIG. 11. If there were any new/incomplete modifications, as shown in the modification queue of FIG. 6, they would be added to the key at this time.
  • Turning now to FIG. 13, the completed manipulation is shown as being processed. FIG. 13 is identical to FIG. 5-6 except there is a check mark in the [0048] box 100 next to “lock 131. This shows that the manipulation is now complete, and the software knows it is accurately representing the status of the lock's memory. Therefore, a complete change may be defined as a change that has not only been changed in the computer, but has been verified to occurred in the lock's memory. It can also be seen that the modification queue 27 is now empty.
  • The system therefore uses the standard user keys as the vehicle for transferring the information from the computer system to the lock's memory. The system may not require any further action (or knowledge of the transfer, for that matter) by the operator to perform the information transfer. The system may be entirely automatic at the lock end. [0049]
  • FIG. 14 shows an electronic lock system that may in one exemplary embodiment incorporate the user addition, deletion and verification feature as described herein. The electronic lock system is provided with a [0050] lock 110 that may be as described in commonly owned U.S. patent application Ser. No. 10/318,328 entitled “Electromechanical Locking Mechanism” filed on Dec. 12, 2002, assigned to Compx Inc. and whose inventors are Richard A. Martinez, Brian Lee Hahn, Mitch Mlynarczyk, Michael Kock, Robert Brewczynski, Claudia Juliana Bevilacqua, Kenneth A. Kaczmarz, Brock Robinson, and John Payson. Such U.S. patent application Ser. No. 10/318,328 is incorporated by reference in its entirety herein for all purposes. The lock 110 is provided with a motor 116 that may be actuated through a microprocessor based control circuit in the lock 110. The motor 116 turns a latching hook 120 in order to either engage or disengage a U-bolt 118. The U-bolt 118 may be connected to a door or other structure desired to be closed and/or locked by the lock 110.
  • The [0051] lock 110 is also. provided with a lock memory 112. The lock memory 112 may either include the microprocessor control circuit in the lock 110 or be in communication with the microprocessor control circuit. The lock memory 112 is provided with a memory interface 114 in order to communicate with a key 122. The key 122 incorporates therein a key memory 124 and a key interface 126. The key interface 126 may be placed in contact with the memory interface 114 of lock 110 in order to transfer data to and from the lock memory 112 and key memory 124.
  • The electronic lock system also includes a [0052] computer 128 into which a database 130 may be retained. The database 130 may be used in order to create a dataset of key to lock relationships, and a modification log that may be used to alter the key to lock relationship. The computer 128 has a computer to key interface 132 that is used for transmitting data to and from the key memory 124 through the key interface 126.
  • It should be understood that the present invention includes various modifications that can be made to embodiments of the system and method for key control in an electronic locking system described herein as come within the scope of the appended claims and their equivalents. [0053]

Claims (27)

What is claimed:
1. A method for use with an electronic locking system, comprising the steps of:
selecting at least one key having a memory to have access to at least one lock having a memory in order to form a dataset of key to lock relationships;
transferring the dataset of key to lock relationships to the memory of at least one key;
presenting the key to at least one of the locks;
transferring at least a portion of the dataset of key to lock relationships from the key to the memory of the lock in order to update the memory of the lock; and
updating the memory of the key to reflect the update to the lock.
2. The method of claim 1, further comprising the step of transferring at least a portion of the memory of the key to a database in order to update the database to indicate completion of the update to the memory of the lock.
3. The method of claim 1, wherein the dataset of key to lock relationships includes corresponding a plurality of the keys to a plurality of the locks to define which of the keys have access to open which of the locks.
4. The method of claim 2, wherein the database includes the dataset of key to lock relationships.
5. The method of claim 1, wherein the lock is an electronic lock having a serial number with a unique alphanumeric lock name assigned to the serial number of the lock in the dataset of key to lock relationships, and wherein the key is an electronic key having a serial number with a unique alphanumeric user name assigned to the serial number of the key in the dataset of key to lock relationships.
6. The method of claim 2, further comprising the step of creating a modification log entry in the database every time the step of selecting at least one key to have access to at least one lock occurs.
7. The method of claim 6, wherein the modification log entry is marked as incomplete until the step of transferring at least a portion of the memory of the key to a database occurs, at which time the modification log entry is marked as complete to indicate completion of the update to the memory of the lock.
8. The method of claim 1, wherein the step of updating the memory of the key further includes writing a serial number of the lock to the memory of the key, and writing the date and time to the memory of the key.
9. The method of claim 1, wherein the step of transferring at least a portion of the dataset of key to lock relationships from the key to a memory of the lock includes transferring only the portion of the dataset of the key to lock relationships specific to that particular lock, and indicating a change in the key to lock relationships from those all ready present in the memory of the lock.
10. The method of claim 1, wherein:
the key has an encrypted key ID and the lock has a list of valid key IDs in the memory of the lock; and said method further comprising the steps of:
decrypting the key ID by the lock;
comparing the key ID to the list of valid key IDs in the memory of the lock; and
opening the lock if a valid key ID is determined by the lock.
11. The method of claim 1, wherein:
the key has an encrypted key password in the memory of the key corresponding to the lock; and
the lock has a lock password corresponding to the key in the memory of the lock; and said method further comprising the steps of:
searching the key memory for the encrypted key password that corresponds to the lock;
decrypting the key password by the lock;
comparing the key password to the lock password corresponding to the key and opening the lock if the two passwords match;
selecting a new lock password and a matching new key password;
encrypting the new key password; and
storing the new encrypted key password in the memory of the key.
12. The method of claim 1, wherein:
the key has an encrypted key ID;
the locks have a list of valid key IDs in the memory of the lock;
the key has an encrypted key password in the memory of the key corresponding to the lock;
the lock has a lock password corresponding to the key in the memory of the lock; and said method further comprising the steps of:
decrypting the key ID by the lock;
comparing the key ID to the list of valid key IDs in the memory of the lock;
determining the key to be valid if the IDs match and maintain the lock closed if the IDs are different;
searching the key memory for the encrypted key password that corresponds to the lock;
decrypting the key password by the lock;
comparing the key password to the lock password corresponding to the key;
selecting a new lock password and a matching new key password;
encrypting the new key password;
storing the new encrypted key password in the memory of the key; and
opening the lock if the IDs match and the passwords match as determined by the step of determining the key to be valid, and by the step of comparing the key password to the lock password.
13. The method of claim 2, further comprising the step of displaying a listing of locks that the key was presented to since the last time the step of transferring at least a portion of memory of the key to the database occurred.
14. A method for use with an electronic locking system, comprising the steps of:
modifying a dataset of key to lock relationships in order to create a modification log having at least one key being added or deleted to at least one lock;
transferring the modification log to a memory of at least one key;
presenting the key to at least one lock;
reading the modification log by the lock and updating the memory of the lock to reflect any addition or deletion of keys to the lock as indicated in the modification log, the modification log read by the lock being in the memory of the key;
updating the modification log in the memory of the key to indicate the updating of the memory of the lock was completed; and
reading the modification log from the memory of the key and updating a database to reflect that the update to the memory of the lock was completed.
15. The method of claim 14, wherein the addition of the key to the lock indicates that the lock is allowed to be opened by the key, and the deletion of the key to the lock indicates that the lock is not allowed to be opened by the key.
16. The method of claim 14, wherein the dataset of key to lock relationships and the modification log is stored in the database.
17. The method of claim 14, wherein the lock is an electronic lock having a serial number with a unique alphanumeric lock name assigned to the serial number of the lock in the dataset of key to lock relationships, and wherein the key is an electronic key having a serial number with a unique alphanumeric user name assigned to the serial number of the key in the dataset of key to lock relationships.
18. The method of claim 14, wherein the database includes the modification log and the addition or deletion of the key to the lock is marked as incomplete until the modification log is read from the memory of the key and updated into the database, after updating the addition or deletion of the key to the lock the entry in the modification log is marked as complete.
19. The method of claim 14, further including the step of updating the memory of the key with a serial number of the lock, the date, and the time upon being presented to the lock.
20. The method of claim 14, further comprising the steps of:
using an encrypted key ID in order to validate whether the key presented to the lock is authorized to open the lock;
using an encrypted key password in order to validate whether the key has authorization to open the lock; and
opening the lock upon determining the key is authorized upon verifying the key ID and the key password.
21. The method of claim 14, wherein:
the key has an encrypted key ID;
the lock has a listing of valid key IDs in the memory of the lock;
the key has an encrypted key password in the memory of the key corresponding to the lock;
the lock has a lock password corresponding to the key in the memory of the lock; and further comprising the steps of:
decrypting the key ID by the lock;
comparing the key ID to the list of valid key IDs in the memory of the lock;
determining the key to be valid if the IDs match and maintaining the lock closed if the IDs are different;
searching the key memory for the encrypted key password that corresponds to the lock;
decrypting the key password by the lock;
comparing the key password to the lock password corresponding to the key;
selecting a new lock password and a matching new key password;
encrypting the new key password;
storing the new encrypted key password in the memory of the key; and
opening the lock if the IDs match and the password match as determined by the step of determining the key to be valid, and by the step of comparing the key password to the lock password.
22. An electronic lock system, comprising:
a lock having a microprocessor based control circuit;
a lock memory in communication with the microprocessor based control circuit of the lock, the lock memory having a listing of keys that have access to the lock stored therein;
a key having a key memory, the key configured for communication with the lock memory such that data being transferable to and from the key memory and lock memory, the key memory having a modification log stored therein containing additions and deletions of keys to the lock;
a computer having a database with a listing of keys that have access to a listing of locks, the computer configured for communication with the key;
wherein the modification log is created by the computer, transferred to the key memory, and at least a portion of the modification log transferred to the lock memory to update the listing of keys that have access to the locks;
wherein the modification log in the key memory is updated to reflect the update to the lock memory; and
wherein at least a portion of the updated modification log in the key memory is transferred to the computer in order to verify completion of an update to the listing of keys that have access to a listing of locks.
23. The electronic lock system of claim 22, wherein the listing of keys that have access to the lock allows the key that has access to the lock to open the lock.
24. The electronic lock system of claim 22, wherein the lock has a serial number, and wherein the serial number, the date, and the time are transferred to the modification log during the updating of the modification log in the key memory, and wherein the serial number, date, and time are transferred to the computer.
25. The electronic lock system of claim 22, wherein the key has an encrypted key ID, the lock memory has a list of valid key IDs, the key memory has an encrypted key password, and the lock memory has an encrypted lock password corresponding to the encrypted key password.
26. The electronic lock system of claim 22, wherein the key memory is divided into five hundred pages wherein one hundred pages include lock passwords, two hundred pages include lock-key database manipulation pages, and two hundred pages include key audit trail pages.
27. The electronic lock system of claim 22, wherein the lock has a motor actuated by the microprocessor based control circuit in order to open and close a latching hook of the lock.
US10/419,718 2003-04-21 2003-04-21 System and method for key control in an electronic locking system Active 2024-09-27 US7145434B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/419,718 US7145434B2 (en) 2003-04-21 2003-04-21 System and method for key control in an electronic locking system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/419,718 US7145434B2 (en) 2003-04-21 2003-04-21 System and method for key control in an electronic locking system

Publications (2)

Publication Number Publication Date
US20040207509A1 true US20040207509A1 (en) 2004-10-21
US7145434B2 US7145434B2 (en) 2006-12-05

Family

ID=33159364

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/419,718 Active 2024-09-27 US7145434B2 (en) 2003-04-21 2003-04-21 System and method for key control in an electronic locking system

Country Status (1)

Country Link
US (1) US7145434B2 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010047410A1 (en) * 2000-05-26 2001-11-29 Isochron Data Corporation System and apparatus for the remote monitoring and control of a computing component
US20050165806A1 (en) * 2003-12-11 2005-07-28 Triteq Lock And Security, Llc Electronic key-control and management system for vending machines
EP1699019A2 (en) * 2005-03-03 2006-09-06 EVVA Sicherheitssysteme GmbH Access control system
US20070200673A1 (en) * 2006-02-13 2007-08-30 Godwin Bryan W Apparatus and Method for Controlling and Monitoring Access to a Storage Container
US7778600B2 (en) 2001-06-29 2010-08-17 Crane Merchandising Systems, Inc. Apparatus and method to provide multiple wireless communication paths to and from remotely located equipment
US20110140838A1 (en) * 2004-02-05 2011-06-16 Salto Systems, S.L. Access control system
US7997484B2 (en) 2006-09-13 2011-08-16 Crane Merchandising Systems, Inc. Rich content management and display for use in remote field assets
US8005425B2 (en) 2001-06-29 2011-08-23 Crane Merchandising Systems, Inc. Method and system for interfacing a machine controller and a wireless network
US8484068B2 (en) 2005-12-14 2013-07-09 Crane Merchandising Systems, Inc. Method and system for evaluating consumer demand for multiple products and services at remotely located equipment
US8533315B2 (en) 2007-10-25 2013-09-10 Crane Merchandising Systems, Inc. Systems and methods for monitoring performance of field assets
US8631093B2 (en) 1998-03-19 2014-01-14 Crane Merchandising Systems, Inc. Remote data acquisition, transmission and analysis system including handheld wireless equipment
US20140055236A1 (en) * 2011-04-27 2014-02-27 Audi Ag Method for actuating a function of a vehicle from a large distance
US8959028B2 (en) 2007-07-02 2015-02-17 Crane Merchandising Systems, Inc. Apparatus and method for monitoring and control of remotely located equipment
US20170230179A1 (en) * 2016-02-05 2017-08-10 Mohammad Mannan Password triggered trusted encrytpion key deletion
US10269202B2 (en) 2001-12-27 2019-04-23 Mobile Tech, Inc. Intelligent key system
US10403122B2 (en) 2005-12-23 2019-09-03 Invue Security Products Inc. Programmable security system and method for protecting merchandise
US10540872B2 (en) 2016-04-15 2020-01-21 Mobile Tech, Inc. Gateway-based anti-theft security system and method
US11532191B2 (en) * 2016-02-26 2022-12-20 Fortress Interlocks Limited Interlock system and parts thereof
US11838290B2 (en) * 2014-01-30 2023-12-05 Schlage Lock Company Llc Hybrid data managed lock system

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050184857A1 (en) 2003-12-11 2005-08-25 Triteq Lock And Security, Llc Electronic security apparatus and method for monitoring mechanical keys and other items
DE102004003212B4 (en) * 2004-01-22 2007-12-13 Sommer Antriebs- Und Funktechnik Gmbh Programming device for transmitter / receiver systems for contactless operation of doors and gates
ES2253971B1 (en) 2004-02-05 2007-07-16 Salto Systems, S.L. ACCESS CONTROL SYSTEM.
US20080111659A1 (en) * 2004-03-09 2008-05-15 Dominic Pesapane Access Control System With Multi-Segment Access Codes and Automatic Void List Deletion
US11002039B2 (en) 2012-04-20 2021-05-11 Triteq Lock And Security, L.L.C. Electronic controlled handles
US11493262B2 (en) 2013-01-18 2022-11-08 Triteq Lock And Security, L.L.C. Cooler lock
US10591201B2 (en) 2013-01-18 2020-03-17 Triteq Lock And Security, Llc Cooler lock
EP2997209B1 (en) 2013-05-15 2021-02-17 TriTeq Lock and Security LLC Lock
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US9741189B2 (en) 2015-09-18 2017-08-22 Geerpres, Inc. Utility cart with electronic lock cabinet
US11176765B2 (en) 2017-08-21 2021-11-16 Compx International Inc. System and method for combined electronic inventory data and access control
US11388595B2 (en) 2018-09-21 2022-07-12 Schlage Lock Company Llc Wireless access credential system
US11157789B2 (en) 2019-02-18 2021-10-26 Compx International Inc. Medicinal dosage storage and method for combined electronic inventory data and access control
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4646080A (en) * 1984-05-17 1987-02-24 Leonard J. Genest Method of code changing for electronic lock
US4766746A (en) * 1986-02-21 1988-08-30 Supra Products, Inc. Electronic real estate lockbox system
US4811012A (en) * 1987-01-28 1989-03-07 Emhart Industries, Inc. Electronic locking system
US4845490A (en) * 1987-01-28 1989-07-04 Emhart Industries, Inc. Electronic locking system
US4887292A (en) * 1985-12-30 1989-12-12 Supra Products, Inc. Electronic lock system with improved data dissemination
US4916443A (en) * 1985-10-16 1990-04-10 Supra Products, Inc. Method and apparatus for compiling data relating to operation of an electronic lock system
US4947163A (en) * 1985-10-16 1990-08-07 Supra Products, Inc. Electronic security system with configurable key
US4988987A (en) * 1985-12-30 1991-01-29 Supra Products, Inc. Keysafe system with timer/calendar features
US5014049A (en) * 1989-04-21 1991-05-07 Multacc Corporation Electronic lock system
US5204663A (en) * 1990-05-21 1993-04-20 Applied Systems Institute, Inc. Smart card access control system
US5476375A (en) * 1993-07-12 1995-12-19 Institute Of Gas Technology Staged combustion in a porous-matrix surface combustor to promote ultra-low NOx Emissions
US5477041A (en) * 1991-02-26 1995-12-19 Computerized Security Systems, Incorporated Adaptable electronic key and lock system
US5745044A (en) * 1990-05-11 1998-04-28 Medeco Security Locks, Inc. Electronic security system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5475375A (en) 1985-10-16 1995-12-12 Supra Products, Inc. Electronic access control systems

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4646080A (en) * 1984-05-17 1987-02-24 Leonard J. Genest Method of code changing for electronic lock
US4947163A (en) * 1985-10-16 1990-08-07 Supra Products, Inc. Electronic security system with configurable key
US4916443A (en) * 1985-10-16 1990-04-10 Supra Products, Inc. Method and apparatus for compiling data relating to operation of an electronic lock system
US4988987A (en) * 1985-12-30 1991-01-29 Supra Products, Inc. Keysafe system with timer/calendar features
US4887292A (en) * 1985-12-30 1989-12-12 Supra Products, Inc. Electronic lock system with improved data dissemination
US4766746A (en) * 1986-02-21 1988-08-30 Supra Products, Inc. Electronic real estate lockbox system
US4845490A (en) * 1987-01-28 1989-07-04 Emhart Industries, Inc. Electronic locking system
US4811012A (en) * 1987-01-28 1989-03-07 Emhart Industries, Inc. Electronic locking system
US5014049A (en) * 1989-04-21 1991-05-07 Multacc Corporation Electronic lock system
US5745044A (en) * 1990-05-11 1998-04-28 Medeco Security Locks, Inc. Electronic security system
US5204663A (en) * 1990-05-21 1993-04-20 Applied Systems Institute, Inc. Smart card access control system
US5477041A (en) * 1991-02-26 1995-12-19 Computerized Security Systems, Incorporated Adaptable electronic key and lock system
US5476375A (en) * 1993-07-12 1995-12-19 Institute Of Gas Technology Staged combustion in a porous-matrix surface combustor to promote ultra-low NOx Emissions

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8631093B2 (en) 1998-03-19 2014-01-14 Crane Merchandising Systems, Inc. Remote data acquisition, transmission and analysis system including handheld wireless equipment
US20010047410A1 (en) * 2000-05-26 2001-11-29 Isochron Data Corporation System and apparatus for the remote monitoring and control of a computing component
US7778600B2 (en) 2001-06-29 2010-08-17 Crane Merchandising Systems, Inc. Apparatus and method to provide multiple wireless communication paths to and from remotely located equipment
US8005425B2 (en) 2001-06-29 2011-08-23 Crane Merchandising Systems, Inc. Method and system for interfacing a machine controller and a wireless network
US10453291B2 (en) 2001-12-27 2019-10-22 Mobile Tech, Inc. Intelligent key system
US10269202B2 (en) 2001-12-27 2019-04-23 Mobile Tech, Inc. Intelligent key system
US10984625B2 (en) 2001-12-27 2021-04-20 Mobile Tech, Inc. Intelligent key system
US20050165806A1 (en) * 2003-12-11 2005-07-28 Triteq Lock And Security, Llc Electronic key-control and management system for vending machines
US7373352B2 (en) * 2003-12-11 2008-05-13 Triteq Lock And Security, Llc Electronic key-control and management system for vending machines
US20110140838A1 (en) * 2004-02-05 2011-06-16 Salto Systems, S.L. Access control system
EP1699019A2 (en) * 2005-03-03 2006-09-06 EVVA Sicherheitssysteme GmbH Access control system
EP1699019A3 (en) * 2005-03-03 2006-11-29 EVVA Sicherheitssysteme GmbH Access control system
US8484068B2 (en) 2005-12-14 2013-07-09 Crane Merchandising Systems, Inc. Method and system for evaluating consumer demand for multiple products and services at remotely located equipment
US11721198B2 (en) 2005-12-23 2023-08-08 Invue Security Products Inc. Programmable security system and method for protecting merchandise
US10600313B2 (en) 2005-12-23 2020-03-24 Invue Security Products Inc. Programmable security system and method for protecting merchandise
US10403122B2 (en) 2005-12-23 2019-09-03 Invue Security Products Inc. Programmable security system and method for protecting merchandise
US20070200673A1 (en) * 2006-02-13 2007-08-30 Godwin Bryan W Apparatus and Method for Controlling and Monitoring Access to a Storage Container
US7997484B2 (en) 2006-09-13 2011-08-16 Crane Merchandising Systems, Inc. Rich content management and display for use in remote field assets
US8959028B2 (en) 2007-07-02 2015-02-17 Crane Merchandising Systems, Inc. Apparatus and method for monitoring and control of remotely located equipment
US8533315B2 (en) 2007-10-25 2013-09-10 Crane Merchandising Systems, Inc. Systems and methods for monitoring performance of field assets
US8884740B2 (en) * 2011-04-27 2014-11-11 Audi Ag Method for actuating a function of a vehicle from a large distance
US20140055236A1 (en) * 2011-04-27 2014-02-27 Audi Ag Method for actuating a function of a vehicle from a large distance
US11838290B2 (en) * 2014-01-30 2023-12-05 Schlage Lock Company Llc Hybrid data managed lock system
US10516533B2 (en) * 2016-02-05 2019-12-24 Mohammad Mannan Password triggered trusted encryption key deletion
US20170230179A1 (en) * 2016-02-05 2017-08-10 Mohammad Mannan Password triggered trusted encrytpion key deletion
US11532191B2 (en) * 2016-02-26 2022-12-20 Fortress Interlocks Limited Interlock system and parts thereof
US10540872B2 (en) 2016-04-15 2020-01-21 Mobile Tech, Inc. Gateway-based anti-theft security system and method
US10776473B2 (en) 2016-04-15 2020-09-15 Mobile Tech, Inc. Authorization control for an anti-theft security system
US11315398B2 (en) 2016-04-15 2022-04-26 Mobile Tech, Inc. Gateway-based anti-theft security system and method

Also Published As

Publication number Publication date
US7145434B2 (en) 2006-12-05

Similar Documents

Publication Publication Date Title
US7145434B2 (en) System and method for key control in an electronic locking system
CN101052970B (en) Access control system and access control method
US7861314B2 (en) Interactive key control system and method of managing access to secured locations
US10565809B2 (en) Method, system and device for securing and managing access to a lock and providing surveillance
JP4906212B2 (en) Key and lock device
US5349345A (en) Electronic lock
US7840010B2 (en) Interactive security control system with conflict checking
US20070096866A1 (en) Vending machines with field-programmable electronic locks
US20060013234A1 (en) Remote access and security system
US6901511B1 (en) Portable terminals, servers, systems, and their program recording mediums
US20080218373A1 (en) Intelligent keyfob management system
US20070061272A1 (en) Access administration system and method for a currency compartment
AU2001239626A1 (en) Key and lock device
JP2010518499A (en) Method for authenticating access to at least one automated component of an industrial facility
JP4373314B2 (en) Authentication system using biometric information
US7702913B2 (en) Interactive security control system with real time activity reports
US7844823B2 (en) Interactive security control system with conflict checking
US20060268758A1 (en) Interactive security control system with audit capabilities
JP3834056B1 (en) Authentication system, reader / writer device and storage
JP5175606B2 (en) Cooperation control system and cooperation control apparatus
JP4043507B1 (en) Wireless lock system using biometrics authentication
US20180122171A1 (en) Smart card duplication device
JP2007304785A (en) Building security system, user information generation apparatus and access control method
JP4462911B2 (en) Access control system
JP6175755B2 (en) Management device, program and card management system

Legal Events

Date Code Title Description
AS Assignment

Owner name: COMPX INTERNATIONAL, INC., SOUTH CAROLINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MLYNARCZYK, MITCHELL S.;PAYSON, JOHN B.;HOEKSTRA, ARON J.;AND OTHERS;REEL/FRAME:014305/0623;SIGNING DATES FROM 20030708 TO 20030714

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553)

Year of fee payment: 12